Netapp

Bootstrap Os

52 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.53%
  • Veröffentlicht 16.07.2024 23:15:16
  • Zuletzt bearbeitet 17.06.2025 19:57:24

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0...

  • EPSS 0.42%
  • Veröffentlicht 16.07.2024 23:15:15
  • Zuletzt bearbeitet 18.06.2025 12:09:38

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0...

  • EPSS 6.32%
  • Veröffentlicht 16.07.2024 18:15:08
  • Zuletzt bearbeitet 19.09.2025 15:50:19

REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `<`, `0` and `%>`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabi...

Medienbericht Exploit
  • EPSS 38.58%
  • Veröffentlicht 01.07.2024 13:15:06
  • Zuletzt bearbeitet 30.09.2025 13:52:23

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to aut...

  • EPSS 0.63%
  • Veröffentlicht 14.05.2024 15:08:51
  • Zuletzt bearbeitet 26.09.2025 19:19:49

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires...

  • EPSS 0.26%
  • Veröffentlicht 13.04.2024 15:15:52
  • Zuletzt bearbeitet 17.06.2025 20:58:12

less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untr...

Exploit
  • EPSS 4.86%
  • Veröffentlicht 11.04.2024 14:15:12
  • Zuletzt bearbeitet 17.06.2025 20:50:56

eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspyth...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 05.04.2024 20:15:09
  • Zuletzt bearbeitet 26.08.2025 17:17:34

GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass.

Exploit
  • EPSS 0.15%
  • Veröffentlicht 27.03.2024 08:15:41
  • Zuletzt bearbeitet 30.07.2025 19:42:21

libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS. libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address,...

Exploit
  • EPSS 1.96%
  • Veröffentlicht 27.03.2024 08:15:41
  • Zuletzt bearbeitet 30.07.2025 19:42:27

When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all...